舉報

會員
Nagios Core Administration Cookbook(Second Edition)
最新章節:
Index
IfyouareanetworkorsystemadministratorandarelookingforinstructionsandexamplesonworkingwithNagiosCore,thenthisbookisforyou.Somebasicshellcommand-lineexperienceisrequired,andsomeknowledgeofscriptingwouldbehelpfulwhenwediscusshowpluginswork.
最新章節
- Index
- Writing custom Nagios Core management scripts
- Getting extra visualizations with NagVis
- Writing customized Nagios Core reports
- Reading status from a Unix socket with MK Livestatus
- Reading status in a MySQL database with NDOUtils
品牌:中圖公司
上架時間:2021-07-16 11:01:37
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Index 更新時間:2021-07-16 12:52:15
- Writing custom Nagios Core management scripts
- Getting extra visualizations with NagVis
- Writing customized Nagios Core reports
- Reading status from a Unix socket with MK Livestatus
- Reading status in a MySQL database with NDOUtils
- Tracking host and service states with Nagiosgraph
- Setting up an event handler script
- Submitting passive checks in response to SNMP traps
- Submitting passive checks from a remote host with NSCA
- Allowing and submitting passive checks
- Introduction
- Chapter 11. Automating and Extending Nagios Core
- Setting up a redundant monitoring host
- Monitoring Nagios performance with nagiostats
- Writing debugging information to the Nagios log file
- Using authenticated contacts
- Using authentication for the Nagios Core web interface
- Introduction
- Chapter 10. Security and Performance
- Dynamically building host definitions
- Using custom directives
- Using another object's directives in a host or service check
- Defining macros in a resource file
- Using inheritance to simplify configuration
- Building groups using regular expressions
- Configuring host roles using groups
- Keeping a configuration under version control
- Grouping configuration files in directories
- Introduction
- Chapter 9. Managing Configuration
- Using the network map as an overlay
- Monitoring inpidual nodes in a cluster
- Establishing a service dependency
- Establishing a host dependency
- Choosing icons for hosts
- Using the network map
- Creating a network host hierarchy
- Introduction
- Chapter 8. Managing Network Layout
- Acknowledging a problem via the web interface
- Scheduling checks from the web interface
- Viewing configuration in the web interface
- Adding comments on hosts or services in the web interface
- Viewing and interpreting notification history
- Viewing and interpreting trends
- Viewing and interpreting availability reports
- Using the Tactical Overview
- Introduction
- Chapter 7. Using the Web Interface
- Using check_mk instead of NRPE
- Using check_by_ssh with key authentication instead of NRPE
- Giving limited sudo(8) privileges to NRPE
- Creating new NRPE command definitions securely
- Setting allowed client hosts for NRPE
- Setting the listening address for NRPE
- Monitoring local services on a remote machine with NRPE
- Introduction
- Chapter 6. Enabling Remote Execution
- Creating an SNMP OID for monitoring
- Monitoring a RAID or other hardware device
- Monitoring the output of an SNMP query
- Monitoring database services
- Checking that a website returns a given string
- Monitoring web services
- Monitoring mail services
- Checking an alternative SSH port
- Monitoring SSH for any host
- Monitoring PING for any host
- Introduction
- Chapter 5. Monitoring Methods
- Filtering notifications based on a host or service value
- Defining a custom notification method
- Defining an escalation for repeated notifications
- Automating contact rotation
- Specifying the number of failed checks before notification
- Choosing states for notification
- Configuring notifications for groups
- Configuring notification periods
- Introduction
- Chapter 4. Configuring Notifications
- Adjusting flapping percentage thresholds for a service
- Managing brief outages with flapping
- Scheduling downtime for a host or service
- Changing thresholds for disk usage
- Changing thresholds for PING RTT and packet loss
- Specifying how frequently to check a host or service
- Introduction
- Chapter 3. Working with Checks and States
- Using macros as environment variables in a plugin
- Implementing threshold checks in a plugin
- Writing a new plugin from scratch
- Using an alternative check command for hosts
- Customizing an existing command
- Creating a new command
- Removing a plugin
- Installing a plugin
- Finding a plugin
- Introduction
- Chapter 2. Working with Commands and Plugins
- Running a service on all hosts on a group
- Creating a new time period
- Creating a new contactgroup
- Creating a new servicegroup
- Creating a new hostgroup
- Verifying configuration
- Creating a new e-mail contact
- Creating a new HTTP service
- Creating a new network host
- Introduction
- Chapter 1. Understanding Hosts Services and Contacts
- Preface
- www.PacktPub.com
- About the Reviewer
- About the Author
- Credits
- 版權信息
- 封面
- 封面
- 版權信息
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Preface
- Chapter 1. Understanding Hosts Services and Contacts
- Introduction
- Creating a new network host
- Creating a new HTTP service
- Creating a new e-mail contact
- Verifying configuration
- Creating a new hostgroup
- Creating a new servicegroup
- Creating a new contactgroup
- Creating a new time period
- Running a service on all hosts on a group
- Chapter 2. Working with Commands and Plugins
- Introduction
- Finding a plugin
- Installing a plugin
- Removing a plugin
- Creating a new command
- Customizing an existing command
- Using an alternative check command for hosts
- Writing a new plugin from scratch
- Implementing threshold checks in a plugin
- Using macros as environment variables in a plugin
- Chapter 3. Working with Checks and States
- Introduction
- Specifying how frequently to check a host or service
- Changing thresholds for PING RTT and packet loss
- Changing thresholds for disk usage
- Scheduling downtime for a host or service
- Managing brief outages with flapping
- Adjusting flapping percentage thresholds for a service
- Chapter 4. Configuring Notifications
- Introduction
- Configuring notification periods
- Configuring notifications for groups
- Choosing states for notification
- Specifying the number of failed checks before notification
- Automating contact rotation
- Defining an escalation for repeated notifications
- Defining a custom notification method
- Filtering notifications based on a host or service value
- Chapter 5. Monitoring Methods
- Introduction
- Monitoring PING for any host
- Monitoring SSH for any host
- Checking an alternative SSH port
- Monitoring mail services
- Monitoring web services
- Checking that a website returns a given string
- Monitoring database services
- Monitoring the output of an SNMP query
- Monitoring a RAID or other hardware device
- Creating an SNMP OID for monitoring
- Chapter 6. Enabling Remote Execution
- Introduction
- Monitoring local services on a remote machine with NRPE
- Setting the listening address for NRPE
- Setting allowed client hosts for NRPE
- Creating new NRPE command definitions securely
- Giving limited sudo(8) privileges to NRPE
- Using check_by_ssh with key authentication instead of NRPE
- Using check_mk instead of NRPE
- Chapter 7. Using the Web Interface
- Introduction
- Using the Tactical Overview
- Viewing and interpreting availability reports
- Viewing and interpreting trends
- Viewing and interpreting notification history
- Adding comments on hosts or services in the web interface
- Viewing configuration in the web interface
- Scheduling checks from the web interface
- Acknowledging a problem via the web interface
- Chapter 8. Managing Network Layout
- Introduction
- Creating a network host hierarchy
- Using the network map
- Choosing icons for hosts
- Establishing a host dependency
- Establishing a service dependency
- Monitoring inpidual nodes in a cluster
- Using the network map as an overlay
- Chapter 9. Managing Configuration
- Introduction
- Grouping configuration files in directories
- Keeping a configuration under version control
- Configuring host roles using groups
- Building groups using regular expressions
- Using inheritance to simplify configuration
- Defining macros in a resource file
- Using another object's directives in a host or service check
- Using custom directives
- Dynamically building host definitions
- Chapter 10. Security and Performance
- Introduction
- Using authentication for the Nagios Core web interface
- Using authenticated contacts
- Writing debugging information to the Nagios log file
- Monitoring Nagios performance with nagiostats
- Setting up a redundant monitoring host
- Chapter 11. Automating and Extending Nagios Core
- Introduction
- Allowing and submitting passive checks
- Submitting passive checks from a remote host with NSCA
- Submitting passive checks in response to SNMP traps
- Setting up an event handler script
- Tracking host and service states with Nagiosgraph
- Reading status in a MySQL database with NDOUtils
- Reading status from a Unix socket with MK Livestatus
- Writing customized Nagios Core reports
- Getting extra visualizations with NagVis
- Writing custom Nagios Core management scripts
- Index 更新時間:2021-07-16 12:52:15